ITEC 1001 Chapter 5 Security
Rootkits are typically used to allow hackers to do which three of the following?
1.Create backdoors 2.Install rogue files 3.Encrypt files
Computers infected with a virus exhibit many symptoms including which three of the following?
1.Files get deleted or encrypted 2.Strange error messages or pop-up ads 3.OS does not launch properly
Select two true statements about fee-based (subscription-based) and free antivirus software programs.
1.Most fee-based software comes with technical support 2.One of the positives of free antivirus software (other than the cost) is their historically strong malware detection performance
Persistent cookies store information about which two of the following?
1.User preferences 2.Password and username information
If you believe you have fallen victim to a phishing scam you should:
1.contact US-CERT 2.contact the institution the message was allegedly sent from
A form of spyware that records all actions typed on a keyboard is called a _______logger.
Keystroke
Which of the following statements are true about ergonomics?
1.A very important element of an effective workplace safety plan 2.Derived from the Greek words ergon (work) and nomoi (natural laws). 3.The study of human interaction with the objects they use. In the computer world, this refers to the interaction humans have with computer hardware devices and computer workstations.
Which two of the following statements are true regarding firewalls?
1.The Mac OS includes firewall protection. 2.Having more than one firewall app on your computer may cause conflicts and other problems.
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___.
Distributed Denial of Service
Select three true statements regarding persistent cookies.
1.Collect information about the Internet protocol (IP) Address. 2.Collect information about user preferences. 3.Collect password and username information.
Which three of the following may be indications that your system has been hacked?
1.Redirected Internet searches 2.Fake e-mails or social media messages in your account 3.Unwanted browser toolbars
Which three of the following statements are true regarding passwords and passcodes?
1.The terms passcode and key are synonymous for password 2.Passwords can be used to secure computers, networks, software, personal accounts, and digital devices 3.Keys are often generated by encryption software or by the vendor who produced the software
Put the following steps in the correct order for setting restrictions in Mac OS X.
1. Select System Preferences,then click Parent Control 2.Click the lock icon to unlock it, then enter an administrator name. 3.Select a user, then click one of the tabs along the top
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called _____.
Adware
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called
Cybercrime
Which component of a network designed to prevent unauthorized Internet intrusions?
Firewall
Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities, was developed by the Project Zero labs at _______, a company better known for its search engine and its Pixel series smartphones.
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ______
Hacker
The right to personal privacy regarding the storing, distributing, and displaying information concerning oneself via the Internet is called _____ privacy. It is a wide-ranging term that refers to a variety of considerations including:
Internet
Receiving spam e-mails and bounced back e-mail is an indication of your digital device is being impacted by an______ nuisance.
Online
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage is called
Pharming
What type of server intercepts all messages between client and server to prevent a hacker or other intruder from attacking a network?
Proxy
A type of malware that is triggered each time you boot your computer is called a
Rootkit
Software programs that hide in the operating system and allow for the installation of hidden files are called
Rootkits
Amateur computer hackers with little programming expertise who illegally gain access to computer systems using programs (scripts) that others have written are called
Script Kiddies
Stored in temporary memory, _______ cookies are used to analyze and measure traffic on a web page.
Session
The software code of a particular computer virus is called the virus
Signature
Software that illicitly collects information about your Internet surfing habits and behaviors is called __.
Spyware
Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber_______
Terrorist
Spam messages are sometimes called _____ and are used for a variety of marketing purposes including selling products and services.
UBE
A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.
antivirus software
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers